Cyber attackers Will Expand Their Horizons to Smaller Targets.
攻击者将越来越多地捕获传输中的数据.
Attackers will increasingly capture data in transit.
攻击者将使用公开泄露的数据泄露数据。
Attackers will be using data from publicly leaked data breaches.
攻击者将利用人工智能(AI)系统并使用AI来帮助攻击.
Attackers will exploit AI systems and use AI to aid assaults.
网络攻击者将在5G/WiFi移交中发现新漏洞.
Attackers will find new vulnerabilities in the 5G/Wi-Fi handover.
彩虹六号:围攻》服务器DDoS攻击者将被永久封禁.
Rainbow Six Siege DDoS attackers will be banned permanently.
攻击者将试图击败这种检测。
Attackers are going to try that password.
但通过不断变化的系统和不断变化的攻击面,攻击者将和今天的防守者一样,不得不面对很大的不确….
With a constantly changing system andits ever-adapting attack surface, attackers will have to deal with significant uncertainty just like defenders do today.
我们预测在2019年,攻击者将越来越倾向于整合各种手段,创建可从多方面协同攻击的安全威胁。
In 2019, we predict attackers will more frequently combine these tactics to create multifaced, or synergistic, threats.
然后,攻击者将收到链接到该帐户的卡片类型,以及该卡的最后两位数。
The attacker would then be presented with the type of card linked to the account, as well as the last two digits of the same.
没有具体的目标,攻击者将通过将兼容的恶意代码分发到尽可能多的计算机来获得最大的收益。
Without a specific target, attackers will get the greatest benefit by distributing compatible malicious code to as many computers as possible.
攻击者将连接到此内部C&C服务器,然后将其传递给组织内的其他受感染计算机。
The attacker would connect to this internal C&C server, which would then pass it on to other compromised machines within the organization.
我们预测在2019年,攻击者将越来越倾向于整合各种手段,创建可从多方面协同攻击的安全威胁。
In 2019, it is expected that attackers will combine these tactics to create multifaceted, synergistic threats.
如果未启用实时扫描,则攻击者将需要等待直到发生计划的扫描才能利用该漏洞。
If real-time scanning is not enabled, the attacker would need to wait until a scheduled scan occurs in order for the vulnerability to be exploited.
如果他们成功了,攻击者将有可能开发代码利用这些漏洞危害用户。
If they succeed, attackers will have the capability to develop exploit code to take advantage of them.
因为该文件的内容可能受到攻击者的控制,因而攻击者将能以root特权执行任意程序。
Because the contents of the file would be under attacker's control, the attacker would be able to execute any program with root privileges.
攻击者将使用这种人工智能恶意软件来寻找访问组织网络并破坏其运营的新方法。
Attackers will use this artificially intelligent malware to find new ways to access an organization's network and disrupt its operations.
由于潜在的巨大回报和不断增加的机会,攻击者将继续探索公有云部署的缺点,从而加以利用。
Due to the potentially big payoff and increasing opportunities, attackers will continue to explore public cloud deployments for weaknesses to exploit.
Attackers will start to leverage adversarial machine learning in their attacks to bypass security products leveraging machine learning for detection of malware," said Alperovitch.
攻击者将利用人工智能(AI)系统并使用AI来帮助攻击.
Attackers will exploit Artificial Intelligence(AI) systems and use AI to aid assaults.
不难预测,更多的攻击者将转向移动类的恶意软件。
It is not difficult to predict that more attackers will shift to mobile malware.
毫无疑问,攻击者将继续改进他们的技术,以便在传输过程中窃取消费者数据。
Attackers will undoubtedly continue to evolve their techniques to steal consumer data when it is in transit.
攻击者将把注意力转移到开发能够颠覆IIoT系统所使用的底层云基础设施的变体上。
Attackers will divert their attention on developing variants that subvert the underlying cloud infrastructure used by IIoT systems.
攻击者将不得不从许多许多块中获取数据--沿着整个链--这是一个不可能完成的任务。
The attackers would have to take data from many many blocks- all along the chain- which is an impossible task.
袭击事件将持续到比往年更高的水平,攻击者将找到新的方法来克服你的防御。
The attacks will continue at a higher level than in previous yearsand the attackers will find new ways to get past your defenses.
随着人们运用大数据分析的广泛化,攻击者将找到避开统计分析和异常检测的方法。
As the use of such big data analytics spreads, attackers will have to find ways to hide from statistical analysis and anomaly detection.
总体而言,攻击者将只使用Windows的内置功能并结合了Metasploit。
In sum, the attacker will only use windows built-in functionality combined with Metasploit.
攻击者将能够创建虚假证书,质疑在线任何数字身份的有效性。
Adversaries will be able to create bogus certificates, calling into question the validity of any digital identity online.
攻击者将通过识别他们发起网络钓鱼攻击,恶意攻击和其他大规模感染技术的易受攻击的系统来获取这些系统。
The attackers will harvest these systems by identifying vulnerable systems that they can infect through phishing attacks, malvertising attacks and other mass infection techniques.
English
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt